You have three devices enrolled in Microsoft Intune as shown in the following table

HOTSPOT You have three devices enrolled in Microsoft Intune as shown in the following table. The device compliance policies in Intune are configured as shown in the following table. The device compliance policies have the assignments shown in the following table. For each of the following statements, select Yes if...

December 7, 2019 No Comments READ MORE +

What should you do from the Security & Compliance admin center?

Your company has a Microsoft 365 E5 subscription. Users in the research department work with sensitive data. You need to prevent the research department users from accessing potentially unsafe websites by using hyperlinks embedded in email messages and documents. Users in other departments must not be restricted. What should you...

December 7, 2019 No Comments READ MORE +

What should you do?

HOTSPOT You need to meet the technical requirement for the SharePoint administrator. What should you do? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. View AnswerAnswer: Explanation: References: https://docs.microsoft.com/en-us/office365/securitycompliance/search-the-audit-log-in-security-and-compliance#step-3-filter-the-search-results

December 7, 2019 No Comments READ MORE +

What is the effective configuration for the members of the Engineering group?

HOTSPOT You plan to allow users from the engineering department to enroll their mobile device in mobile device management (MDM). The device type restrictions are configured as shown in the following table. The device limit restrictions are configured as shown in the following table. What is the effective configuration for...

December 7, 2019 No Comments READ MORE +

What should you do?

Your network contains an on premises Active Directory domain. Your company has a security policy that prevents additional software from txnrwj installed on domain controllers. You need to monitor a domain controller by using Microsoft Azure Advanced Threat Protection (ATP). What should you do? More than one answer choice may...

December 7, 2019 No Comments READ MORE +

What is the minimum number of data sources and log collectors you should create from Microsoft Cloud App Security?

HOTSPOT You need to meet the technical requirement for log analysis. What is the minimum number of data sources and log collectors you should create from Microsoft Cloud App Security? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. View AnswerAnswer:...

December 7, 2019 No Comments READ MORE +

What is the maximum amount of time data will be retained in the Microsoft 365 audit log?

You have a Microsoft 365 subscription All users are assigned a Microsoft 365 E3 License. You enable auditing for your organization. What is the maximum amount of time data will be retained in the Microsoft 365 audit log?A . 2 yearsB . 1 yearC . 30 daysD . 90 daysView...

December 7, 2019 No Comments READ MORE +

What should you configure from the Cloud Discover settings?

You have a Microsoft 36S subscription. Your company purchases a new financial application named App1. From Cloud Discovery in Microsoft Cloud App Security, you view the Discovered apps page and discover that many applications have a low score because they are missing information about domain registration and consumer popularity. You...

December 6, 2019 No Comments READ MORE +

What should you do?

HOTSPOT You have a Microsoft Azure Active Directory (Azure AD) tenant named contoso.onmicrosoft.com. Your company implements Windows Information Protection (WIP). You need to modify which users and applications are affected by WIP. What should you do? To answer, select the appropriate options m the answer area. NOTE: Each correct selection...

December 6, 2019 No Comments READ MORE +

Which report should the New York office auditors view?

Which report should the New York office auditors view?A . DLP policy matchesB . DLP false positives and overridesC . DLP incidentsD . Top Senders and RecipientsView AnswerAnswer: C Explanation: References: https://docs.microsoft.com/en-us/office365/securitycompliance/data-loss-prevention-policies

December 6, 2019 No Comments READ MORE +